Energy efficient routing with cluster approach in wireless networks – A literature review
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.35Keywords:
Wireless networks, Clustering approach, Efficient routing, Malicious attacks, energy efficientDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This literature review examines the cluster-based approaches in wireless networks, focusing on their effectiveness in conserving energy, enhancing routing efficiency, and improving network credibility. Wireless networks are increasingly employed in various applications, from internet of things (IoT) systems to mobile ad hoc networks, where energy efficiency is critical due to the limited battery life of devices. Cluster-based techniques group nodes into clusters to optimize resource utilization, facilitating energy conservation by enabling localized communication and reducing redundant transmissions. The review explores various clustering algorithms, such as low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED), highlighting their impact on network longevity and scalability. Additionally, the study addresses the challenges of maintaining robust routing protocols within clustered networks, emphasizing the importance of reliable data transmission and node credibility to mitigate risks from malicious attacks. By synthesizing current research findings, this review provides insights into the future directions of cluster-based strategies in wireless networks, suggesting potential enhancements to ensure efficient energy management and reliable network performance.Abstract
How to Cite
Downloads
Similar Articles
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Umadevi, S. Ranganathan, IoT based energy aware local approximated MapReduce fuzzy clustering for smart healthcare data transmission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Prabhu, A. Chandrabose, Improving the resource allocation with enhanced learning in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.